Tag Archive for: Beyond

Protection beyond the pipeline – Engineer Live

Protection beyond the pipeline
Engineer Live
Attacks using malware, such as 2012's Flame, which spread via a local area network or USB memory sticks and recorded audio, screenshots and keyboard activity, could see an organisation lose business-critical data or intellectual property. And malware …

and more »

flame malware – read more

Beyond the data breach singularity – why your online identity may never be safe again – ZDNet


ZDNet

Beyond the data breach singularity – why your online identity may never be safe again
ZDNet
… so they're not going to know if their information is out there and compromised — and then [they'll] get their bank account drained and credit card details stolen," Thomas adds. If it wasn't time to pay attention to every hack and data breach

“data breach” – Google News

Mobile security that businesses can take to the bank – and beyond – ITProPortal


ITProPortal

Mobile security that businesses can take to the bank – and beyond
ITProPortal
Mobile phones are steadily displacing ATMs and branches as the preferred way that consumers interact with financial services. Two years ago, more than half of U.S. smartphone owners already were using mobile banking, and another 12 per cent planned to …

“mobile security” – read more

Mobile Security: Look Beyond the Device – Security Intelligence (blog)


Security Intelligence (blog)

Mobile Security: Look Beyond the Device
Security Intelligence (blog)
When we think of mobile security, the first thought that pops into our heads is securing the device and the content on the device. While this approach has worked well for many companies in the mobile security space, it covers only 20 percent of the threat.

and more »

“mobile security” – read more